https://bugs.winehq.org/show_bug.cgi?id=45920
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Summary|Crossfire EU client crashes |Crossfire EU HGWC (Hacking |on startup |GateWay Client) crashes on | |startup (needs | |NtQueryVirtualMemory | |'MemorySectionName' info | |class support) Component|-unknown |ntdll Resolution|--- |DUPLICATE Keywords| |obfuscation Status|UNCONFIRMED |RESOLVED
--- Comment #1 from Anastasius Focht focht@gmx.net --- Hello folks,
dupe of bug 38792 which is a dupe of bug 23999
--- snip --- $ pwd /home/focht/.wine/drive_c/Program Files (x86)/SmilegateWest/Crossfire Europe EU
$ WINEDEBUG=+seh,+relay wine ./CF_SGI.exe >>log.txt 2>&1 ... 0009:Call KERNEL32.CreateProcessW(00000000,06d11e10 L""HGWC.exe" D300A64C4383DD2D096AF7DC88D9DB7D1B192A904760458DB04D64AF2DEA894E53FFA15CC5F4B5EAD2762F2DC63A77B4783C183220C23DF70E9ABAA390EDC04E3C11D9641197E733F4F807F16DE63458B657583E503CCA80CCF1980FFCBB9CA02CBB830ABB00E31485FEA431EAC6A412592F47FCF2890DB9D2C694CF18DB9896149C64D002A02B1B5EFFAD4905262279"...,00000000,00000000,00000000,00000410,00000000,00000000,00337ad0,00337ac0) ret=7db6b3c6 ... 0079:Call KERNEL32.__wine_kernel_init() ret=7bc6d5f8 0009:Ret KERNEL32.CreateProcessW() retval=00000001 ret=7db6b3c6 ... 0079:Call KERNEL32.GetModuleHandleW(004a8c54 L"ntdll.dll") ret=0041b8c1 0079:Ret KERNEL32.GetModuleHandleW() retval=7bc30000 ret=0041b8c1 0079:Call KERNEL32.GetProcAddress(7bc30000,004a8ffc "ZwQueryVirtualMemory") ret=0041b8c8 0079:Ret KERNEL32.GetProcAddress() retval=7bc3ad2c ret=0041b8c8 0079:Call ntdll.ZwQueryVirtualMemory(ffffffff,00400000,00000002,0033c0a8,0000020c,00000000) ret=0041b8fb 0079:fixme:virtual:NtQueryVirtualMemory (process=0xffffffff,addr=0x400000) Unimplemented information class: MemorySectionName 0079:Ret ntdll.ZwQueryVirtualMemory() retval=c0000003 ret=0041b8fb 0079:Call KERNEL32.GetLastError() ret=0041b905 0079:Ret KERNEL32.GetLastError() retval=00000000 ret=0041b905 0079:trace:seh:raise_exception code=c0000005 flags=0 addr=0x41ba20 ip=0041ba20 tid=0079 0079:trace:seh:raise_exception info[0]=00000000 0079:trace:seh:raise_exception info[1]=00000000 0079:trace:seh:raise_exception eax=00000000 ebx=ffffffff ecx=95960af4 edx=00000002 esi=0033c34c edi=00000000 0079:trace:seh:raise_exception ebp=004d5904 esp=0033c09c cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00210246 0079:trace:seh:call_stack_handlers calling handler at 0x499a56 code=c0000005 flags=0 ... wine: Unhandled page fault on read access to 0x00000000 at address 0x41ba20 (thread 0079), starting debugger... --- snip ---
$ sha1sum Crossfire_downloader.exe bcec5f1019dc7d30aab123e5f615605a1604332a Crossfire_downloader.exe
$ du -sh Crossfire_downloader.exe 2.1M Crossfire_downloader.exe
$ wine --version wine-3.17
Regards
*** This bug has been marked as a duplicate of bug 23999 ***